Zahoor Ahmad Najar’s research while affiliated with Central University of Kashmir and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Safeguarding IoT Networks: Mitigating Black Hole Attacks with an Innovative Defence Algorithm
  • Article
  • Full-text available

January 2024

·

82 Reads

·

11 Citations

Journal of Engineering Research

·

Sahil Sholla

·

Zahoor Ahmad Najar

The Internet of Things (IoT) and Wireless Sensor Networks (WSNs) have rapidly spread in recent decades, leading to remarkable innovation and integrated possibilities. The switch from IPv4 to IPv6, made possible by advancements in networking technology and the use of nanodevices, has further improved connectivity. This move allows for connecting a wider range of devices to servers. Nevertheless, the increasing interconnectivity has brought about difficulties in efficiently overseeing and analysing the enormous amount of data produced throughout all levels of the IoT. The requirement of comprehensive security management is particularly concerning for IoT devices due to their large quantity and small size. Within the layered architecture of IoT, the network layer assumes pivotal importance in ensuring security, bearing responsibility for storing routing information and executing corresponding decisions. The Black Hole attack is a frequently encountered and significant concern among the security attacks addressed. This paper thoroughly examines the consequences of the Black Hole attack on IoT networks, carefully analyzing its impact. Furthermore, it presents a novel mitigation algorithm designed to counter such threats efficiently. The research employs NS2 and Simulink to run extensive simulations, enabling the evaluation of network throughput and Packet Delivery Ratio (PDR). Applying the proposed mitigation strategy to a network affected by the Black Hole attack results in a significant improvement in throughput, which closely resembles that of an unaffected network. The observed Packet Delivery Ratio (PDR) is measured at 98.21%. This highlights the algorithm’s effectiveness in mitigating the detrimental effects of the Black Hole attack on IoT networks.

Download

Fog Computing for Delay Minimization and Load Balancing

January 2022

·

62 Reads

·

1 Citation

Cloud is used to store and process data at a very high rate. Moreover, nearly everyone in this world is using the cloud. However, the problem arises that the data centers are not positioned well. The data reach the cloud by passing through the various links, due to which more delays occur. So this world is now moving into fog. Fog computing provides us the capability to process data nearer to the IoT devices. During the past decade, IoT devices have been growing rapidly, resulting in the production of a tremendous amount of data every day. For the processing of this ever-growing data, efficient algorithms are required to reduce the load on the cloud and give the results in a faster and more precise manner. The processing should be done on the fog node to handle this issue. In this paper, the authors study load balancing on fog nodes with a novel technique so that they distribute the load among different fog nodes so that none of the fog nodes remains idle while other takes time for processing the data.

Citations (1)


... The attacker's drop packets are identified to mitigate the attacks from the networks. The exact causes of the sinkhole attacks are detected and provide relevant solutions to solve the issues [21]. The BC-based model maximizes the precision of attack detection which enlarges the feasibility range of the systems [22]. ...

Reference:

A Novel Time‐to‐Response Based Attack Mitigation Technique for Internet of Things‐Integrated Wireless Sensor Networks
Safeguarding IoT Networks: Mitigating Black Hole Attacks with an Innovative Defence Algorithm

Journal of Engineering Research